Descripción: | Description:
The remote host is missing updates announced in advisory CLA-2003:615.
Samba provides SMB/CIFS services (such as file and printer sharing) used by clients compatible with Microsoft Windows(TM).
The SuSE Security Team performed a security audit in parts of the Samba project code and found various problems in both the client and server implementations. Among these problems is a buffer overflow[1] vulnerability in the packet fragment re-assembly code. A remote attacker who is able to connect to the samba server may gain root privileges on it by exploiting this vulnerability.
The vulnerability also affects the client library code, thus it is possible to exploit applications which use samba library functions by using a malicious samba server to send traffic to them.
Additionally, a race condition[2] was discovered which could allow a local attacker to overwrite critical system files.
In Conectiva Linux versions 7.0 and 8 samba is being upgraded to the latest stable version: 2.2.8. This version fixes the above vulnerabilities and includes several other fixes and additional features[3]. In Conectiva Linux 6.0, a patch with fixes the above vulnerabilities was applied to the package originally distributed, keeping samba in its original version (2.0.9).
Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade'
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0086 http://www.samba.org/samba/whatsnew/samba-2.2.8.html http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:615 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003
Risk factor : Critical
CVSS Score: 10.0
|